You are on page 1of 1

NAME: Ron Ace Jarantilla COURSE/SECTION: BSIT – 102I

SUBJECT: Fundamental of IT – ITC 103

WW2: Midterms Assignment #8 – M4U3

1. If you use an open network, what email configuration setting should you ensure is
enabled?
 Enable Secure Sockets Layer or Transport Layer Security (SSL/TSL) encryption to
protect the account password.
2. You have installed a screensaver application. Later, after updating your anti-virus
software, a malicious program is found. This appears to have infected your system at the
same time as the screensaver was installed. What class of malware is this?
 Trojan Horse – an apparently legitimate application that conceals malicious
functions, such as spyware or a bot allowing remote control of the PC.
3. You want to use a website that hosts training modules in a custom media format. What
type of add-on would you need to install to play this media?
 You would need to install a type of browser add-on called a plug-in. It should be
restricted to interacting with the media object on the web page.
4. What type of file might a website use to track whether you have visited it before?
 Cookie – It is plain text produced by a website when you visit it. The cookies’
purpose is to store session information in order to personalize the website.
5. True or false? Browser pop-up windows are definite symptoms of virus infection.
 False – these might be a result of adware or an intentional showcase of a particular
website (which, admittedly, you would not want to visit frequently).
6. You are using a computer in an Internet cafe. What should you do at the end of the
session?
 Clear the browser cache – It is a smart option to clear your browser cache as it
prevents you from using old forms. So, it protects your personal identification.
7. What identifies a website as using the secure HTTPS protocol with a valid certificate?
 The URL shows the “https://” protocol and the browser shows a padlock icon. For
sites that have passed special validation regimes, the address bar will be shown in
green.
 If a site uses "https," but the certificate is not trusted by the browser, an alert is
displayed.
8. You want to restrict access to a computer on your network to a single Internet host
running a particular application. What two things do you need to configure in your
firewall's access control list?
 The IP address of the host and the port number of the application.

You might also like